We are proud to present you our unique image comparison algorithm implemented as standalone dll file. It has only one exported function with two bitmap pointers in and similarity percentage out. Can work with many programming languages including Delphi, Visual C++, C#, VB and VB.NET. We can also provide you with the modified DLL. It can precalculate image hash (768 bytes) and you can use these hashes for comparison then.
You can check our comparison algorithm with help of our Image Comparer tool.

Datum Locker allows the record keeping of account credentials and note taking which are deemed sensitive. Its strength comes from the use of an undocumented mathematically sound cryptographic algorithm to store your data on disk in addition to presenting an intruder with random semantics for the omittance of a valid key.
Datum Locker operates on a timer monitoring when the application becomes idle, such a time will result in the application locking'n'docking onto the system tray.
Datum Locker allows you to juggle your workstation notes and login accounts safely as behind the scenes a lock exists on this data using cryptography as it is fundamentally for your eyes only.

The algorithm is designed to transfer an encryption key between two parts electronically in a hidden fashion. This free test script simulate such an exchange beween two parts. It is written for the best owerview and understanding possible..

JFish is a simple Java implementation of the popular Twofish cryptographyalgorithm. It allows any application to easily implement powerful encryption, using a single small library and minimal code changes..

JRijndael is a 100% pure Java implementation of the popular Rijndael (aka AES) cryptographyalgorithm. It's designed to be implemented as easily as possible and features ECB, padding, and a simple API..

NSGA-II is a very famous multi-objective optimization algorithm. I submitted an example previously and wanted to make this submission useful to others by creating it as a function. Even though this function is very specific to benchmark problems, with a little bit more modification this can be adopted for any multi-objective optimization.
The function is nsga_2(pop,gen). The input arguments for the function are population size and number of generations. For customization purposes the user is free to modify the objective function (function of several decision variables) by modifying an m file (evaluate_objective.

Gravitational search algorithm (GSA) is an optimization algorithm based on the law of gravity and mass interactions.This algorithm is based on the Newtonian gravity: "Every particle in the universe attracts every other particle with a force that is directly proportional to the product of their masses and inversely proportional to the square of the distance between them"..

The Jonker-Volgenant algorithm is much faster than the famous Hungarian algorithm for the Linear Assignment Problem (LAP). This Matlab implementation is modified from the original C++ code made by Roy Jonker, one of the inventors of the algorithm. It is about 10 times faster than the munkres code (v2.2) of the author. It can solve a 1000 x 1000 problem in about 3 seconds in a normal Intel Centrino processor.
V1.1 returns the dual variables and the reduced cost matrix as well.
V1.2 can deal with nonsquare assignment problems.

A flexible implementation of PSO algorithm with time-varying parameters. Algorithm is suitable for solving continuous optimization problems. Special care has been taken to enable flexibility of the algorthm with respect to its parameters and to initial population selection. Detailed logging of the algorithm performance during the search is also enabled..

findMIS is an heuristic algorithm for solving Maximum Independent Set problem (MIS).
An independent set of a graph is a subset of vertices in which no two vertices are
adjacent. Given a set of vertices, the maximum independent set problem calls
for finding the independent set of maximum cardinality.
Algorithm run in O(n^2) time, where n is the number of vertices (worst case).
Experimentally: time = 8.1e-007*n^2 + 2.2e-005*n + 0.00012 seconds, (see screenshot)
The algorithm has been independently developped but is similar to:
Balaji, Swaminathan, Kannan, "A Simple Algorithm to Optimize
Maximum Independent Set", Advanced Modeling and Optimization, Volume 12, Number 1, 2010
Notation:
The neighborhood of v is defined by N(v) ={u in V such that u is adjacent to v}
The DEGREE of a vertex v in V, denoted by deg(v) and is defined by the...

We use the genetic algorithm (gatool) to determine the four parameters of the implicit Forst-Kalkwarf-Thodos Model. Predictions are in perfect agreement with data of vapour pressure of iodobenzene versus temperature for a temperature range from 380.15 K to 580.15 K..

This is an extremely fast implementation of the famous Hungarian algorithm (aslo known as Munkres' algorithm). The new version (V2.2)is about 1.5 times faster than the old version (V2.1). It can solve a 1000 x 1000 problem in about 20 seconds in a Core Duo (T2500 @ 2.00GHz) XP laptop with Matlab 2008a, which is about 2.5 times faster than the mex code "assignmentoptimal" in FEX ID 6543, about 6 times faster than the author's first version in FEX ID 20328, and at least 30 times faster than other Matlab implementations in the FEX.

To thwart various types of malware and attacks, a PC user needs more than just an antivirus application nowadays. If you are among such security conscious users, investing in a capable internet security suite makes sense. However, the problem lies ...

There are many PC diagnostic and restore tools you can use nowadays but very few of them can be like Reimage. In fact, it is near impossible to find a true alternative to this online PC repair tool. It detects errors in Windows OS and performs ...

With Mp3 and music video downloads becoming easier owing to availability of high speed web access at cheap rates, millions of people find their PCs laden with gigabytes of audio files. These files can be of varying bitrates, formats and it becomes ...

Using a computer without having capable Security software installed is equivalent to sleeping with your house’s main door wide open. Whether you use a PC at home or manage a network of computers at the workplace, PC security suite has become a ...

When it comes to buying software to make audio, video and data discs, you have a plethora of options nowadays. From barebones freeware apps to feature rich and costly apps like Nero, there are several contenders at your disposal. However, if you ...

Nowadays, the need to secure the data in your computers and other web access devices has increased manifold. With increased web access speed and emergence of portable devices like tablets to access web and share data, data security can no longer be ...

Nearly every PC user needs to back up data from time to time. While copying data like media content or documents to external drives is easy, few users bother to take backups of personal settings and related data. However, restoring a computer to ...

When it comes to bitmap image editing and retouching, Adobe Photoshop reigns supreme, presence of industry rivals and emergence of new contenders notwithstanding. This has been the case for last decade. As Photoshop has evolved into the feature ...

PC users often need to share documents and files with others. This can be for both personal and professional requirements. However, compatibility often becomes an issue when you share documents with other computer users. The OS or software version ...